righettod / powershell-android-utils
PowerShell module providing utility commands to manipulate a APK file on Windows
☆11Updated 2 months ago
Alternatives and similar repositories for powershell-android-utils:
Users that are interested in powershell-android-utils are comparing it to the libraries listed below
- Offensive tool for guessing Active Directory credentials via Kerberos☆9Updated last year
- E-mails, subdomains and names Harvester - OSINT☆10Updated 5 years ago
- Recon-ng modules for basic OSINT.☆11Updated 2 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆33Updated 4 years ago
- A tool to check for response status codes with ease☆14Updated last year
- Computer Network Exploitation (CNE) Field Manual☆13Updated 9 months ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Mobile Pentesting Guide (WIP)☆24Updated 4 years ago
- OSCP Preperation☆13Updated 3 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆35Updated 4 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- Filters for Shodan Search engine to find vulnerbilities devices connected to internet☆13Updated 4 years ago
- Custom pentesting tools☆24Updated 4 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- SocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and T…☆10Updated 2 years ago
- Extract domain from SSL Information☆13Updated 3 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆58Updated 3 years ago
- [Custom || Automated] Curation & Collection of BugBounty Wordlists☆38Updated this week
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- Search Google Dorks like Chad. / Broken link hijacking tool.☆26Updated last week
- Ease and assist the compromise of an Active Directory environment.☆27Updated 3 years ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆39Updated this week
- HiveNightmare a.k.a. SeriousSam Local Privilege Escalation in Windows – CVE-2021-36934☆8Updated 3 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆32Updated this week
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 3 years ago
- Scans the filesystem for directories that are user-writeable☆11Updated 3 years ago
- A port scanner written in PowerShell☆13Updated 3 years ago